Page 50 - CSI - Cisco Security Introduction
P. 50
Ensure compliance before granting
access
Enhance the NGFW’s policy control with the Cisco Identity Services Engine (ISE)
ISE pxGrid TrustSec
BYOD Employee Tag Guest Tag
Supplier Tag Quarantine Tag ISE
Guest Access Server Tag Suspicious Tag
Propagate
Segmentation
• User Context
Firepower • Device context
Management Center • Access policies
Policy automation
Remediate breaches
Set access control policies Propagate rules and context Establish a secure network
automatically
©
© 2018 Engage ESM All Rights Reserved 2018 Engage ESM All Rights Reserved